Kaspersky Lab could use your help decrypting Gauss malware

I can’t recall another time when an anti-virus company did this, but Kaspersky Lab has reached out to the world at large to see if someone has what it takes to decrypt a portion of the Gauss malware that is designed to steal information from the infected computers. If you want to get in on the action, email theflame@kaspersky.com and …

Computer Direct Outlet in Greenville SC for computer parts

Sure, we sell computers, servers and all the components that comprise them, but we don’t always stock every part. Yes, we can get any part the next business morning at no additional charge, but sometimes, you need something TODAY and therefore, I am making a plug for our friends over at Computer Direct Outlet here in Greenville, SC. CDO stocks …

Microsoft and Adobe to tag team you with patches this month – August 2012

A plethora of patches are just around the corner. Not just from Microsoft, but from Adobe also, as they team up for an onslaught on your computer in August. I don’t think anyone using Microsoft Windows will escape the patchy update goodness on Tuesday! Microsoft will be unleashing nine bulletins, of which, five are rated as critical. These updates will …

I invented the world’s first internally programmable computer

I just read the most awesome story that involved an older man approaching a much younger guy at a coffee shop and striking up a conversation. In the conversation, the older gentleman made some pretty tall claims, such as “I invented the first computer”, and how he created the world’s first digital image. You should go read this story here. …

How to stay safe in the cloud

Here’s an article that I thought I would share about how to stay safe in the cloud… While I would not say it is the end all, be all post for cloud security, it does point out some great ways to protect yourself. As businesses move to hosted solutions such as SaaS (Software As A Service), cloud storage, and get …

Rogue network devices could be more common than one might think #RaspberryPi #PwnPlug

A while back, I wrote about devices that could be used on a network to gain access, be deployed by just about anyone, and potentially be undetected by IT staff or employees of a business. Here’s a follow-up. Recently I have been playing around with a 35 dollar micro computer called the Raspberry Pi.  This lil’ pup of a computer is …